CVE-2020-1992Use of Externally-Controlled Format String in Palo Alto Networks Pan-os

Severity
9.8CRITICALNVD
CNA8.1
EPSS
2.1%
top 16.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 8
Latest updateMay 24

Description

A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 9.0 versions before 9.0.7; PAN-OS 9.1 versions before 9.1.2 on PA-7000 Series devices with an LFC installed and configured. This issue requires WildFire services to be configured and enabled. This issu

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDpaloaltonetworks/pan-os9.0.09.0.7+1
CVEListV5palo_alto_networks/pan-os9.09.0.7+1
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
GHSA
GHSA-rpm3-9x65-q856: A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to cr2022-05-24
CVEList
PAN-OS on PA-7000 Series: Varrcvr daemon network-based denial of service or privilege escalation2020-04-08

📋Vendor Advisories

1
Palo Alto
PAN-OS on PA-7000 Series: Varrcvr daemon network-based denial of service or privilege escalation2020-04-08
CVE-2020-1992 — Palo Alto Networks Pan-os vulnerability | cvebase